![](https://www.2old2play.com/sites/default/files/styles/tiny/public/pictures/imported/20764976794893b269d9cb1.jpg?itok=HpcWlqWi)
jquack
Shared on Fri, 04/04/2008 - 17:22I had been looking over the Jericho Files #4 today and was comparing it to #5....and I've decided that #5 is more epic than #4 turns out to be. I may not finish #5 before a part 5 is required. Part 4 was only 3 parts.
So, because I love you guys...here is The Jericho Files #4.1!
Do you want to execute? [y/n]
I stared at the computer screen, completely unsure if I actually wanted to execute this command or not. Doing so would most assuredly wipe out the security systems of my own personal warehouse. But desparate times called for desparate measures.
Pershaps I should go back to the beginning.
Two days ago, my warehouse received what could simply be called a 'redirected shipment'. The original owners would like to call it 'hijacked', but I've always considered that to be such a dirty word. In business, it's not what you say. It's how you say it.
Anyway, the redirected shipment was quite precious to their original owners. They considered it precious enough to send a squad of trained hitmen in to retrieve it.
They began by breaching the outer perimeter of my land. My fences were electrified in random spots that constantly cycled themselves. I like to keep them guessing. How they climbed or got past it, I'd love to find out.
My warehouse, on the outside, looks like one big building. On the inside, you may be amazed to discover the one big building is just a shell that houses close to 20 different smaller warehouses. These store all my various 'findings' over the years, not to mention my arsenal of vehicles, weaponry, and equipment for jobs. Most of the warehouses are locked and sealed, but all were controlled by a centralized database of computerized security machines. If one got breached, all of the warehouses would lock down tight. Keeping anybody else, but locking everyone else in.
It also was quite smart in it's countermeasures. It was programmed to constantly use it camera's to examine the occupants of the building, and match them against a database of biometric characteristics. Such as heart rate and pulse. To determine if the individual was a welcome or unwelcome guest. It would then react accordingly.
The assailants had breached my land, and entered my main warehouse shell. They were now making their way into the first warehouse. My security cameras were picking them up, but not responding any other way. This raised my suspicions, so I investigated.
As I began to examine the security system for flaws, I discovered a problem. a BIG problem. They had planted a virus in my security system. The virus was elaborate enough to remove my database of biometrics and replace it with the information of my unwelcome guests.
I shuddered at what this meant. The countermeasures of the security system was now configured to treat everyone other than these robbers as unwelcome guests.
Including me.
Shortly after I realized this, I heard the click and whirr of a countermeasure becoming active. I ducked to the side behind a large metal container. My heart began to race as I hear the *CLANG CLANG CLANG* of metal bullets riveting the side of the metal container I was leaning against.
I knew my system well enough to know that all the other guns had become active as well. I was trapped in my own warehouse, with my own security system against me.
Quickly, I began to think. I had overseen the entire construction of this facility. I knew the layout better than the one who drew up the plans for me. I tried my best to remember what this warehouse contained. My mind raced through the container manifests that I had practically memorized in a frantic attempt to see if anything here could help me out.
As another round of bullets pounded against the metal container, a number sprang to my head....#56394.
Container #56394 contained a plethora of electronic equipment from a heist in Sweden. A local group of computer geeks were running their own ring of servers filled to the brim with illegally copied movies, music and other forms of media. The heist by authorities lifted the servers from the group and shipped them off for evidence. But somewhere along the road, the equipment was...lost. It's amazing what can happen when you make a detour and electronically inject some modified paperwork.
Container #56394 had what I needed. A laptop. A computer with a connection to this very much alive security system. I just had to get there without being turned into swiss cheese.
I turned my head across the corner, looking for a path to move to the next container. If I remembered correctly, #56394 was 4 or 5 containers over. I just had to move from container to container, using them for cover.
I eyed my path and took a deep breath. I placed a foot against the container I was leaning against and launched myself to the next container. I hear the gun fire up and begin to shoot rounds at me. I landed on the ground behind the other container, rolling to get the best distance away from the gun. The rounds stopped pounding the container seconds later. I continued my trek to the container.
Moments later, I reached it. #56394 was staring me in the face. I unlatched it's door and made my way in. I scrounged through the various boxes and lockers, looking for the one electronic device that could get me out of this mess. Midway through the container, I found the device I so desperately needed. I booted it up and exhaled to find that the battery was fully charged. That left me at ease, I don't think I could stand anymore of the remote control guns shooting at me.
I reached into my shirt and retrieved my memory stick. On that memory stick contained every database file and program I could ever need should my computer systems become compromised.....like they were now. I loaded the stick and accessed my files. The security system was unique in that it did not require direct access to the terminal. It could receive wireless signals at any terminal and make necessary changes. I modified the laptops wireless settings to access the security system and examine the damage.
The changes to my system were elaborate, and very well masked. The virus had hidden the options to change the settings of the system. I, in effect, was locked out. There was no way to allow my biometrics back into the system.
There was just one thing left to do.
My fingers worked frantically across the keyboard. I used the utilities on my memory stick to construct a counter-virus for my security system. This virus was designed to do two things. Find a workaround entry into the system and neutralize the virus infecting the sytem. It was also designed to completely disable the security system once the virus was found and neutralized. This way, the intruders couldn't try again.
I coded as quickly as I could. I knew the intruders were getting closer to my side of the warehouse mazes. I had to work fast. My mind was working at a frantic pact to try and create the necessary lines of code to bring my own genius design down.
What seemed like an eternity passed, as I finished the coding. I began the connection to transfer the code. As I finished the wireless handshake, I was prompted by the computer.
Do you want to execute? [y/n]
The question was an important one. Without this security system, the odds were against me with these intruders. I was out-manned and out-gunned. But either way, the system is useless to me. I pressed the enter and heard the satisfying click of the keyboard. The connection began to transfer the file to the security system.
That's when I heard another click. A loud and very audible click. Like the cocking of a gun.
And another.
And another.
And another.
And another.
I turned slowly and saw 5 men standing at the entrance to the container. 5 guns cocked and ready to blow me apart if I even moved a little.
It looks like I had been found....
*to be continued*
So, because I love you guys...here is The Jericho Files #4.1!
Do you want to execute? [y/n]
I stared at the computer screen, completely unsure if I actually wanted to execute this command or not. Doing so would most assuredly wipe out the security systems of my own personal warehouse. But desparate times called for desparate measures.
Pershaps I should go back to the beginning.
Two days ago, my warehouse received what could simply be called a 'redirected shipment'. The original owners would like to call it 'hijacked', but I've always considered that to be such a dirty word. In business, it's not what you say. It's how you say it.
Anyway, the redirected shipment was quite precious to their original owners. They considered it precious enough to send a squad of trained hitmen in to retrieve it.
They began by breaching the outer perimeter of my land. My fences were electrified in random spots that constantly cycled themselves. I like to keep them guessing. How they climbed or got past it, I'd love to find out.
My warehouse, on the outside, looks like one big building. On the inside, you may be amazed to discover the one big building is just a shell that houses close to 20 different smaller warehouses. These store all my various 'findings' over the years, not to mention my arsenal of vehicles, weaponry, and equipment for jobs. Most of the warehouses are locked and sealed, but all were controlled by a centralized database of computerized security machines. If one got breached, all of the warehouses would lock down tight. Keeping anybody else, but locking everyone else in.
It also was quite smart in it's countermeasures. It was programmed to constantly use it camera's to examine the occupants of the building, and match them against a database of biometric characteristics. Such as heart rate and pulse. To determine if the individual was a welcome or unwelcome guest. It would then react accordingly.
The assailants had breached my land, and entered my main warehouse shell. They were now making their way into the first warehouse. My security cameras were picking them up, but not responding any other way. This raised my suspicions, so I investigated.
As I began to examine the security system for flaws, I discovered a problem. a BIG problem. They had planted a virus in my security system. The virus was elaborate enough to remove my database of biometrics and replace it with the information of my unwelcome guests.
I shuddered at what this meant. The countermeasures of the security system was now configured to treat everyone other than these robbers as unwelcome guests.
Including me.
Shortly after I realized this, I heard the click and whirr of a countermeasure becoming active. I ducked to the side behind a large metal container. My heart began to race as I hear the *CLANG CLANG CLANG* of metal bullets riveting the side of the metal container I was leaning against.
I knew my system well enough to know that all the other guns had become active as well. I was trapped in my own warehouse, with my own security system against me.
Quickly, I began to think. I had overseen the entire construction of this facility. I knew the layout better than the one who drew up the plans for me. I tried my best to remember what this warehouse contained. My mind raced through the container manifests that I had practically memorized in a frantic attempt to see if anything here could help me out.
As another round of bullets pounded against the metal container, a number sprang to my head....#56394.
Container #56394 contained a plethora of electronic equipment from a heist in Sweden. A local group of computer geeks were running their own ring of servers filled to the brim with illegally copied movies, music and other forms of media. The heist by authorities lifted the servers from the group and shipped them off for evidence. But somewhere along the road, the equipment was...lost. It's amazing what can happen when you make a detour and electronically inject some modified paperwork.
Container #56394 had what I needed. A laptop. A computer with a connection to this very much alive security system. I just had to get there without being turned into swiss cheese.
I turned my head across the corner, looking for a path to move to the next container. If I remembered correctly, #56394 was 4 or 5 containers over. I just had to move from container to container, using them for cover.
I eyed my path and took a deep breath. I placed a foot against the container I was leaning against and launched myself to the next container. I hear the gun fire up and begin to shoot rounds at me. I landed on the ground behind the other container, rolling to get the best distance away from the gun. The rounds stopped pounding the container seconds later. I continued my trek to the container.
Moments later, I reached it. #56394 was staring me in the face. I unlatched it's door and made my way in. I scrounged through the various boxes and lockers, looking for the one electronic device that could get me out of this mess. Midway through the container, I found the device I so desperately needed. I booted it up and exhaled to find that the battery was fully charged. That left me at ease, I don't think I could stand anymore of the remote control guns shooting at me.
I reached into my shirt and retrieved my memory stick. On that memory stick contained every database file and program I could ever need should my computer systems become compromised.....like they were now. I loaded the stick and accessed my files. The security system was unique in that it did not require direct access to the terminal. It could receive wireless signals at any terminal and make necessary changes. I modified the laptops wireless settings to access the security system and examine the damage.
The changes to my system were elaborate, and very well masked. The virus had hidden the options to change the settings of the system. I, in effect, was locked out. There was no way to allow my biometrics back into the system.
There was just one thing left to do.
My fingers worked frantically across the keyboard. I used the utilities on my memory stick to construct a counter-virus for my security system. This virus was designed to do two things. Find a workaround entry into the system and neutralize the virus infecting the sytem. It was also designed to completely disable the security system once the virus was found and neutralized. This way, the intruders couldn't try again.
I coded as quickly as I could. I knew the intruders were getting closer to my side of the warehouse mazes. I had to work fast. My mind was working at a frantic pact to try and create the necessary lines of code to bring my own genius design down.
What seemed like an eternity passed, as I finished the coding. I began the connection to transfer the code. As I finished the wireless handshake, I was prompted by the computer.
Do you want to execute? [y/n]
The question was an important one. Without this security system, the odds were against me with these intruders. I was out-manned and out-gunned. But either way, the system is useless to me. I pressed the enter and heard the satisfying click of the keyboard. The connection began to transfer the file to the security system.
That's when I heard another click. A loud and very audible click. Like the cocking of a gun.
And another.
And another.
And another.
And another.
I turned slowly and saw 5 men standing at the entrance to the container. 5 guns cocked and ready to blow me apart if I even moved a little.
It looks like I had been found....
*to be continued*
- jquack's blog
- Log in or register to post comments
Comments